Comparison between Linux commands and Solaris commands-Linux general technology-Linux technology and application information. For more information, see the following. 1) view open ports
Linux: netstat-atn
Solaris: netstat-P tcp-f inet-
2) view NIC/network status
Linux: ifconfig
So
1. select an appropriate installation.
Only install the required software package.This example is solaris9.
2. Install System Patches
Download the patch from sunsolve.sun.comUnzip 9_Recommended.zipCd 9_Recommended./Install_cluster
3. Minimize Service Startup
A. Disable services that do not need to be started. Generally, the service can be disabled. A.1 S01MOUNTFSYSMount all local filesystems.A.2 S05RMTMPFILESStart to delete temporary filesA.3 S20sysetupSystem settings need to be startedA.4 S21pe
Article Title: Use encryption commands to ensure the security of the Solaris server (figure ). Linux is a technology channel of the IT lab in China. Includes desktop applications, Linux system management, kernel research, embedded systems, open-source, and other basic categories. The security of Solaris server systems is closely related to their encryption system
Solaris system management commands and Related Technologies
A
Bytes -----------------------------------------------------------------------------------
Ab2admin-command line interface for AnswerBook2 Management
Ab2cd-run the AnswerBook2 server from documentation CD
Ab2regsvr-register AnswerBook2 document server with the joint Domain Name Service
Accept, reject-accept or reject print requests
Acct-Overview o
The original article was written on the Netease blog at 20:48:07 and has been deleted
Today, for work reasons, I need to know the directory structure of a software installation under Solaris. I thought of the Tree Command. Unfortunately, there is no tree command under DOS under Solaris.
After searching for the Internet, I found that some people, like me, need to use the Tree Command similar to dos in some
IOS development diary 9-terminal commands, ios diary 9-Terminal
Today, bloggers have some terminal usage requirements and encountered some difficulties. I would like to share with you the hope to make common progress.
OSX uses Unix file systems. All files are mounted under the directory "/". Therefore, the concept of drive letters in Windows is not required.
Note
JSP basic syntax, 3 Compilation commands, 7 Action commands, 9 built-in objectsI. jsp Overview
JSPIs the abbreviation of java server page, which is essentially a simplified servlet and a dynamic web page technical standard. Jsp pages are embedded in java segments in HTML pages. applications developed using jsp can be used across platforms.Ii. jsp basic syntax
2.
) -passwordfilepasswd[sslpasswd] (1SSL) - computepasswordhashes[[emailprotected]tmp]#whatissortsort (1p) - sort,merge,orsequencechecktextfilessort (1) -sort linesoftextfilessort (3pm)-perlpragmatocontrolsort () behaviour which command: shows the full path of (shell) commandsFeatures view the path of the executable commandSyntaxWhich COMMANDInstance[email protected] tmp]# which lsalias ls= ' ls--color=auto '/bin/ls[[email protected] tmp]# which PASSWD/USR/BIN/PA Sswd[[email protected] tmp]# w
Common Linux commands (9) and common linux commands
The cat command is used to connect files or standard input and print. This command is often used to display the file content, connect several files, or read and display the content from the standard input. It is often used with the redirection symbol.
1. Command Format:
Cat [Option] File
2. command functions:
C
some interaction:The help documentation is as follows:Help for Interactive Commands-procps version 3.2.7Window 1:def:cumulative mode Off. System:delay 4.0 secs; Secure mode Off.Z,b Global: ' Z ' change color mappings; ' B ' disable/enable boldL,t,m Toggle summaries: ' l ' load avg; ' t ' TASK/CPU stats; ' m ' Mem info1,i Toggle SMP View: ' 1 ' single/separate states; ' I ' Irix/solaris modeF,o. Fields/colu
extracting it.6. Dd CommandThe DD command is used to copy change hard disk partitions. If you use the wrong place, it's also dangerous.The following is a list of DD commands: DD if=/dev/hda of=/dev/hdbdd if=/dev/hda of=/dev/sdbdd if=something of=/dev/hdadd if=something OF=/DEV/SDAThe following command will clear the entire primary drive 0: DD If=/dev/zero of=/dev/had7. Shell Script CodeSometimes, you might get a pit, give you a shell script file tha
9 PHP commands amp; code that must always be vigilant. Nine PHP commands that must be vigilant all the time;};: known as ForkBomb, is a Linux system that is vulnerable to DoS attacks. :() {:|:};: Is a bash function. As long as the code is executed, it will repeat nine PHP commands and code that must be vigilant at all
./file.txt:tieba.baidu.com./file.txt:www.baidu.com/search/indexIf an error is reported
grep: unrecognized option `--exclude-dir=test'
If the version is too old, update it.
(8) Search for IP addresses
Here the-O and-P commands are used.
We can use man grep to view
-O, -- only-matching:
Show only the part of a matching line that matches pattern.
-P, -- Perl-Regexp:
Interpret pattern as a Perl regular expression.
That is to say,-o only displays
The Linux shell/terminal command is very powerful, even though a simple command can cause folders, files, or path folders to be deleted. To avoid this, we should always keep an eye on PHP code commands, and today bring 9 Linux commands code that must always be vigilant.The Linux shell/terminal command is very powerful, even though a simple command can cause fol
regular basis, and then place the accepted tar file in this directory before extracting it.6. Dd CommandThe DD command is used to copy change hard disk partitions. If you use the wrong place, it's also dangerous.The following is a list of DD commands:
DD If=/dev/hda OF=/DEV/HDB
DD If=/dev/hda OF=/DEV/SDB
DD if=something Of=/dev/hda
DD if=something OF=/DEV/SDA
The following command will clear the entire primary drive 0: DD I
directory before extracting it.
6. Dd Command
The DD command is used to copy change hard disk partitions. If you use the wrong place, it's also dangerous.
The following is a list of DD commands:
DD If=/dev/hda of=/dev/hdbdd if=/dev/hda of=/dev/sdbdd if=something of=/dev/hdadd if=something OF=/DEV/SDA
The following command will clear the entire primary drive 0: DD If=/dev/zero of=/dev/had
7. Shell Script Code
Sometimes, you might get a pit, give you
code to get you to compile him. The code may be normal code, but there are some malicious code disguised in large source code, and if so, your system is shot. How to avoid it? Only accept and compile source code for trusted sources. 9. Decompression Bomb You have received a compressed file and you are asked to extract this seemingly small file, which may be as small as KB. In fact, this small size compressed file contains highly compressed data. As
file into this directory before decompression, you can avoid being a victim of tar bomb.
6. Dd Command
The Dd command is used to copy and change the hard disk partition. If you use the wrong part, it is dangerous.
The following list the dd commands:
ddif=/dev/hdaof=/dev/hdbddif=/dev/hdaof=/dev/sdbddif=somethingof=/dev/hdaddif=somethingof=/dev/sda
The following Command clears the entire hard drive: dd if =/dev/zero of =/dev/had
7. Shell Script Code
So
Show all itineraries that contain other users-c--lines--width--HELP Display Help information--version Display version displayFor example, show all processes Ps-aDisplays the specified user information ps-u rootShow all process information, along with command line Pa-efPS and grep common use combination to find specific processesCommand: Ps-ef|grep 9090 to find the 9090 port processList all the programs that are currently in memoryCommand: PS auxNOTE: PS gives us a one-time view of the process,
(1) ShutdownThe shutdown command is used for shutdown restart with the syntax format:shutdown [Options] TimeWhere the-c option represents the shutdown command that cancels the previous setting, the-H command indicates shutdown, and the-r command indicates a restartExample: Immediate restart: shutdown-h now(2) Other power-off restart commandsOther shutdown commands: Halt, Poweroff, Init 0, other restart commands
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.